-
2
-
-
0020849266
-
Maintaining knowledge about temporal intervals
-
Allen J.F. Maintaining knowledge about temporal intervals. Communications of the ACM 26 11 (1983) 832-843
-
(1983)
Communications of the ACM
, vol.26
, Issue.11
, pp. 832-843
-
-
Allen, J.F.1
-
3
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Bose, A., Hu, X., Shin, K.G., Park, T., 2008. Behavioral detection of malware on mobile handsets. In: Proceeding of the Sixth International Conference on Mobile Systems, Applications, and Services.
-
(2008)
Proceeding of the Sixth International Conference on Mobile Systems, Applications, and Services
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
4
-
-
63049091681
-
From desktop to mobile: examining the security experience
-
Botha R.A., Furnell S.M., and Clarke N.L. From desktop to mobile: examining the security experience. Computer and Security 28 (2009) 130-137
-
(2009)
Computer and Security
, vol.28
, pp. 130-137
-
-
Botha, R.A.1
Furnell, S.M.2
Clarke, N.L.3
-
5
-
-
51449120796
-
Mobile device profiling and intrusion detection using smart batteries
-
Buennemeyer, T.K. et al., 2008. Mobile device profiling and intrusion detection using smart batteries. International Conference on System Sciences, pp. 296-296.
-
(2008)
International Conference on System Sciences
, pp. 296-296
-
-
Buennemeyer, T.K.1
-
6
-
-
0034563991
-
CAPSUL: A constraint-based specification of repeating patterns in time-oriented data
-
Chakravarty S., and Shahar Y. CAPSUL: A constraint-based specification of repeating patterns in time-oriented data. Annals of Mathematics and AI 30 1-4 (2000) 3-22
-
(2000)
Annals of Mathematics and AI
, vol.30
, Issue.1-4
, pp. 3-22
-
-
Chakravarty, S.1
Shahar, Y.2
-
7
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
Cheng, J., Wong, S.H., Yang, H., Lu, S., 2007. SmartSiren: virus detection and alert for smartphones. In: Proceedings of the Fifth International Conference on Mobile Systems, Applications and Services.
-
(2007)
Proceedings of the Fifth International Conference on Mobile Systems, Applications and Services
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
8
-
-
77955175843
-
-
http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf
-
Dikinson J. The new antivirus formula (2005). http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf
-
(2005)
The new antivirus formula
-
-
Dikinson, J.1
-
10
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
Hwang S.S., Cho S., and Park S. Keystroke dynamics-based authentication for mobile devices. Computer and Security 28 (2009) 85-93
-
(2009)
Computer and Security
, vol.28
, pp. 85-93
-
-
Hwang, S.S.1
Cho, S.2
Park, S.3
-
12
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H., Smith, J., Shin, K.G., 2008. Detecting energy-greedy anomalies and mobile malware variants. In: Proceeding of the Sixth International Conference on Mobile Systems, Applications, and Services.
-
(2008)
Proceeding of the Sixth International Conference on Mobile Systems, Applications, and Services
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
15
-
-
0036095845
-
Enhancing profiles for anomaly detection using time granularities
-
Li Y., et al. Enhancing profiles for anomaly detection using time granularities. Journal of Computer Security 10 1-2 (2002) 137-157
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 137-157
-
-
Li, Y.1
-
16
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
Martin, T., Hsiao, M., Ha, D., Krishnaswami, J., 2004. Denial-of-service attacks on battery-powered mobile computers. In: Second IEEE International Conference on Pervasive Computing and Communications, pp. 309-318.
-
(2004)
Second IEEE International Conference on Pervasive Computing and Communications
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
20
-
-
79953787924
-
-
AMIA, San Francisco, USA
-
Moskovitch, R., Shahar, Y., 2009. Medical temporal-knowledge discovery via temporal abstraction. AMIA 2009, San Francisco, USA.
-
(2009)
Medical temporal-knowledge discovery via temporal abstraction
-
-
Moskovitch, R.1
Shahar, Y.2
-
26
-
-
50049091842
-
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
-
Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. Securecomm and Workshops, pp. 1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
27
-
-
0031234827
-
IDAMN: an intrusion detection architecture for mobile networks
-
Samfat D., and Molva R. IDAMN: an intrusion detection architecture for mobile networks. IEEE Journal on Selected Areas in Communications 15 7 (1997) 1373-1380
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
28
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
Schmidt A.D., Peters F., Lamour F., Scheel C., Camtepe S.A., and Albayrak S. Monitoring smartphones for anomaly detection. Mobile Networks and Applications (MONET) 14 1 (2009) 92-106
-
(2009)
Mobile Networks and Applications (MONET)
, vol.14
, Issue.1
, pp. 92-106
-
-
Schmidt, A.D.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Camtepe, S.A.5
Albayrak, S.6
-
30
-
-
77955175318
-
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
-
Shabtai A., Fledel Y., Elovici Y., and Shahar Y. Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. Journal in Computer Virology 8 3 (2009) 267-298
-
(2009)
Journal in Computer Virology
, vol.8
, Issue.3
, pp. 267-298
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
Shahar, Y.4
-
31
-
-
84867714245
-
-
Shabtai, A., Elovici, Y., 2010. Applying behavioral detection on android-based devices. In: Proceedings of the 3rd International Conference on Mobile Wireless Middleware, Operating Systems, and Applications (Mobilware 2010), Springer, Chicago, USA.
-
Shabtai, A., Elovici, Y., 2010. Applying behavioral detection on android-based devices. In: Proceedings of the 3rd International Conference on Mobile Wireless Middleware, Operating Systems, and Applications (Mobilware 2010), Springer, Chicago, USA.
-
-
-
-
32
-
-
0031069719
-
A framework for knowledge-based temporal abstraction
-
Shahar Y. A framework for knowledge-based temporal abstraction. Artificial Intelligence 90 1-2 (1997) 79-133
-
(1997)
Artificial Intelligence
, vol.90
, Issue.1-2
, pp. 79-133
-
-
Shahar, Y.1
-
33
-
-
0030200817
-
Knowledge-based temporal abstraction in clinical domains
-
Shahar Y., and Musen M.A. Knowledge-based temporal abstraction in clinical domains. Artificial Intelligence in Medicine 8 3 (1996) 267-298
-
(1996)
Artificial Intelligence in Medicine
, vol.8
, Issue.3
, pp. 267-298
-
-
Shahar, Y.1
Musen, M.A.2
-
35
-
-
51749114272
-
A survey of fuzzy cognitive maps learning method
-
Grzegorzewski, P, Krawczak, M, Zadrozny, S, Eds
-
Stach, W., Kurgan, L., Pedrycz, W., 2005. A survey of fuzzy cognitive maps learning method. In: Grzegorzewski, P., Krawczak, M., Zadrozny, S. (Eds.), Issues in Soft Computing: Theory and Applications, Exit, pp. 71-84.
-
(2005)
Issues in Soft Computing: Theory and Applications, Exit
, pp. 71-84
-
-
Stach, W.1
Kurgan, L.2
Pedrycz, W.3
-
36
-
-
77953131660
-
Specification and evaluation of polymorphic shellcode properties using a new temporal logic
-
Talbi M., Mejry M., and Bouhoula A. Specification and evaluation of polymorphic shellcode properties using a new temporal logic. Journal in Computer Virology (2008)
-
(2008)
Journal in Computer Virology
-
-
Talbi, M.1
Mejry, M.2
Bouhoula, A.3
-
37
-
-
26444504890
-
A mobile phone malicious software detection model with behavior checker
-
Yap T.S., and Ewe H.T. A mobile phone malicious software detection model with behavior checker. Lecture Notes in Computer Science 3597 (2005) 57-65
-
(2005)
Lecture Notes in Computer Science
, vol.3597
, pp. 57-65
-
-
Yap, T.S.1
Ewe, H.T.2
|